Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/hashicorp/vagrant: GHSA-47xw-vw6m-w9fq #2168

Closed
GoVulnBot opened this issue Oct 31, 2023 · 1 comment
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-47xw-vw6m-w9fq, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/hashicorp/vagrant 2.4.0 < 2.4.0

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/hashicorp/vagrant
      versions:
        - fixed: 2.4.0
      packages:
        - package: github.com/hashicorp/vagrant
summary: |-
    HashiCorp Vagrant Insecure Operation on Windows Junction / Mount Point
    vulnerability
cves:
    - CVE-2023-5834
ghsas:
    - GHSA-47xw-vw6m-w9fq
references:
    - web: https://nvd.nist.gov/vuln/detail/CVE-2023-5834
    - web: https://discuss.hashicorp.com/t/hcsec-2023-31-vagrant-s-windows-installer-allowed-directory-junction-write/59568
    - advisory: https://github.com/advisories/GHSA-47xw-vw6m-w9fq

@neild neild self-assigned this Nov 2, 2023
@neild neild added the excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. label Nov 2, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/539339 mentions this issue: data/excluded: batch add 7 excluded reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants